NSL-KDD Dataset
☆202Jul 30, 2015Updated 10 years ago
Alternatives and similar repositories for NSL_KDD
Users that are interested in NSL_KDD are comparing it to the libraries listed below
Sorting:
- NSLKDD Dataset for WEKA☆36Mar 2, 2018Updated 8 years ago
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆129Sep 8, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999☆21Nov 3, 2019Updated 6 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆272Apr 5, 2020Updated 5 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 7 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆295Dec 22, 2023Updated 2 years ago
- ARM is Turing-complete without data fetches☆19Mar 22, 2018Updated 8 years ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆34Nov 8, 2024Updated last year
- Deep learning malware detection system using the EMBER dataset☆11Nov 22, 2024Updated last year
- ☆21Sep 21, 2020Updated 5 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- Basic Machine learning projects and assignments done by me.☆33Aug 12, 2020Updated 5 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- A Pytorch implementation of the paper `Deep Autoencoding Gaussian Mixture Model For Unsupervised Anomaly Detection` by Zong et al.☆69May 12, 2020Updated 5 years ago
- converting malware .bytes file to image☆10Apr 19, 2019Updated 6 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 7 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆676Dec 4, 2023Updated 2 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 2 years ago
- ☆70Feb 10, 2023Updated 3 years ago
- Ryu component-based software defined networking framework☆31Sep 17, 2021Updated 4 years ago
- Machine Learning Based - Intrusion Detection System☆32Jun 21, 2022Updated 3 years ago
- Short Course - Applied Machine Learning for Security Informatics☆57Aug 26, 2016Updated 9 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- 双向身份认证系统☆10Nov 25, 2021Updated 4 years ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆50Aug 2, 2019Updated 6 years ago
- Deep Learning Tool for Off-line Network Intrusion Detection System☆23Oct 15, 2018Updated 7 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,524Oct 1, 2020Updated 5 years ago